Tag: Hash

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/

Alpine Linux

Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/alpine-linux/

BackBox Linux

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/

Cisco CCNA Video Lecture

Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm

Permanent link to this article: https://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/

Cryptography from Fachbereich Informatik

This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html  

Permanent link to this article: https://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/

Cryptography and Protocols – Spring 2014

http://www.cs.sfu.ca/CourseCentral/404/abulatov/

Permanent link to this article: https://www.darknessgate.com/2014/09/20/cryptography-protocols-spring-2014/

Introduction to Modern Cryptography 2012

Cryptography has a very long and exciting history. For centuries, political leaders and military forces have used cryptographic techniques, primarily to communicate securely. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/18/introduction-modern-cryptography-2012/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

CNIT 121: Computer Forensics

The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/

CSE571S: Network Security (Fall 2011)

A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/04/cse571s-network-security-fall-2011/

Applied Cryptography

Have you wondered how one might define security — even for a cryptographic concept as simple and familiar as encryption? What makes public-key cryptography possible? (Well, what is public-key cryptography?) What is MD5 and what’s wrong with it? What is homomorphic encryption? What are zero-knowledge proofs (and are they for real)? What magical tools can …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/01/applied-cryptography/